Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

[Feature Request] Optional executable verification by hash or last modification date #545

Closed
cypherbits opened this issue Nov 11, 2021 · 2 comments
Labels
feature a whole new feature

Comments

@cypherbits
Copy link

cypherbits commented Nov 11, 2021

Right now we are whitelisting executable paths, that means that if we allow /home/username/myProgram a malware could replace that file to gain connection access. We can prevent this by:

  1. Easy+fast but can be bypassed way: check the last modification date and alert the user.

  2. Use Blake3 hash to check file integrity. (I say Blake3 because it is a cryptographic hash but it is very fast).

And with this, I just thought of something, I propose: what about a new feature to allow executing a certain executable with a hash independently of where it is (path)?? This could "fix" #543 too.

@cypherbits cypherbits added the feature a whole new feature label Nov 11, 2021
@gustavo-iniguez-goya
Copy link
Collaborator

Hi @cypherbits ,

This was already requested here #413 so please, comment on that issue please :) . There're interesting comments and ideas.

@gustavo-iniguez-goya
Copy link
Collaborator

I'm closing this issue. We'll continue discussing this feature on #413 . Thank you!

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
feature a whole new feature
Projects
None yet
Development

No branches or pull requests

2 participants